{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:36:02Z","timestamp":1774539362819,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Bundesministerium f\u00fcr Bildung und Forschung","award":["16KISK003K"],"award-info":[{"award-number":["16KISK003K"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,11]]},"DOI":"10.1145\/3560828.3564006","type":"proceedings-article","created":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T15:38:50Z","timestamp":1667576330000},"page":"45-53","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Evaluating Deception and Moving Target Defense with Network Attack Simulation"],"prefix":"10.1145","author":[{"given":"Daniel","family":"Reti","sequence":"first","affiliation":[{"name":"German Research Center For Artificial Intelligence, Kaiserslautern, Germany"}]},{"given":"Daniel","family":"Fraunholz","sequence":"additional","affiliation":[{"name":"German Research Center For Artificial Intelligence, Munich, Germany"}]},{"given":"Karina","family":"Elzer","sequence":"additional","affiliation":[{"name":"German Research Center For Artificial Intelligence, Kaiserslautern, Germany"}]},{"given":"Daniel","family":"Schneider","sequence":"additional","affiliation":[{"name":"German Research Center For Artificial Intelligence, Kaiserslautern, Germany"}]},{"given":"Hans Dieter","family":"Schotten","sequence":"additional","affiliation":[{"name":"German Research Center For Artificial Intelligence, Kaiserslautern, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Security and Privacy in Communication Networks (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ),","author":"Al-Shaer Ehab","unstructured":"Ehab Al-Shaer , Qi Duan , and Jafar Haadi Jafarian . 2013. Random Host Mutation for Moving Target Defense . In Security and Privacy in Communication Networks (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ), , Angelos D. Keromytis and Roberto Di Pietro (Eds.). Springer , Berlin, Heidelberg , 310--327. https:\/\/doi.org\/10.1007\/978--3--642--36883--7_19 10.1007\/978--3--642--36883--7_19 Ehab Al-Shaer, Qi Duan, and Jafar Haadi Jafarian. 2013. Random Host Mutation for Moving Target Defense. In Security and Privacy in Communication Networks (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ), , Angelos D. Keromytis and Roberto Di Pietro (Eds.). Springer, Berlin, Heidelberg, 310--327. https:\/\/doi.org\/10.1007\/978--3--642--36883--7_19"},{"key":"#cr-split#-e_1_3_2_1_2_1.1","unstructured":"Callum Baillie Maxwell Standen Jonathon Schwartz Michael Docking David Bowman and Junae Kim. 2020. CybORG: An Autonomous Cyber Operations Research Gym. https:\/\/doi.org\/10.48550\/ARXIV.2002.10667 10.48550\/ARXIV.2002.10667"},{"key":"#cr-split#-e_1_3_2_1_2_1.2","unstructured":"Callum Baillie Maxwell Standen Jonathon Schwartz Michael Docking David Bowman and Junae Kim. 2020. CybORG: An Autonomous Cyber Operations Research Gym. https:\/\/doi.org\/10.48550\/ARXIV.2002.10667"},{"key":"#cr-split#-e_1_3_2_1_3_1.1","doi-asserted-by":"crossref","unstructured":"Malek Ben Salem and Salvatore Stolfo. 2011. Decoy Document Deployment for Effective Masquerade Attack Detection. (2011) 35--54. https:\/\/doi.org\/10.7916\/D86W9 MFJ 10.7916\/D86W9","DOI":"10.1007\/978-3-642-22424-9_3"},{"key":"#cr-split#-e_1_3_2_1_3_1.2","doi-asserted-by":"crossref","unstructured":"Malek Ben Salem and Salvatore Stolfo. 2011. Decoy Document Deployment for Effective Masquerade Attack Detection. (2011) 35--54. https:\/\/doi.org\/10.7916\/D86W9 MFJ","DOI":"10.1007\/978-3-642-22424-9_3"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2010.89"},{"key":"e_1_3_2_1_5_1","volume-title":"abs\/1606.01540","author":"Brockman Greg","year":"2016","unstructured":"Greg Brockman , Vicki Cheung , Ludwig Pettersson , Jonas Schneider , John Schulman , Jie Tang , and Wojciech Zaremba . 2016. Open AI Gym . Co RR , Vol. abs\/1606.01540 ( 2016 ). showeprint[arXiv]1606.01540 http:\/\/arxiv.org\/abs\/1606.01540 Greg Brockman, Vicki Cheung, Ludwig Pettersson, Jonas Schneider, John Schulman, Jie Tang, and Wojciech Zaremba. 2016. OpenAI Gym. CoRR , Vol. abs\/1606.01540 (2016). showeprint[arXiv]1606.01540 http:\/\/arxiv.org\/abs\/1606.01540"},{"key":"e_1_3_2_1_6_1","unstructured":"Augusto Paes de Barros. 2003. DLP and honeytokens. http:\/\/blog.securitybalance.com\/2007\/08\/dlp-and-honeytokens.html. Accessed: 2022-07--27.  Augusto Paes de Barros. 2003. DLP and honeytokens. http:\/\/blog.securitybalance.com\/2007\/08\/dlp-and-honeytokens.html. Accessed: 2022-07--27."},{"key":"e_1_3_2_1_7_1","volume-title":"Examining the Efficacy of Decoy-based and Psychological Cyber Deception. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Ferguson-Walter Kimberly J.","unstructured":"Kimberly J. Ferguson-Walter , Maxine M. Major , Chelsea K. Johnson , and Daniel H. Muhleman . 2021 . Examining the Efficacy of Decoy-based and Psychological Cyber Deception. In 30th USENIX Security Symposium (USENIX Security 21) . USENIX Association, 1127--1144. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/ferguson-walter Kimberly J. Ferguson-Walter, Maxine M. Major, Chelsea K. Johnson, and Daniel H. Muhleman. 2021. Examining the Efficacy of Decoy-based and Psychological Cyber Deception. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 1127--1144. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/ferguson-walter"},{"key":"e_1_3_2_1_8_1","volume-title":"Christoph Lipps, Daniel Reti, Daniel Krohmer, Frederic Pohl, Matthias Tammen, and Hans Dieter Schotten.","author":"Fraunholz Daniel","year":"2018","unstructured":"Daniel Fraunholz , Simon Duque Anton , Christoph Lipps, Daniel Reti, Daniel Krohmer, Frederic Pohl, Matthias Tammen, and Hans Dieter Schotten. 2018 a. Demystifying Deception Technology:A Survey . https:\/\/doi.org\/10.48550\/ARXIV.1804.06196 10.48550\/ARXIV.1804.06196 Daniel Fraunholz, Simon Duque Anton, Christoph Lipps, Daniel Reti, Daniel Krohmer, Frederic Pohl, Matthias Tammen, and Hans Dieter Schotten. 2018a. Demystifying Deception Technology:A Survey. https:\/\/doi.org\/10.48550\/ARXIV.1804.06196"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3268966.3268970"},{"key":"e_1_3_2_1_10_1","volume-title":"Deception in honeynets: A game-theoretic analysis. In 2007 IEEE SMC information assurance and security workshop","author":"Garg Nandan","unstructured":"Nandan Garg and Daniel Grosu . 2007. Deception in honeynets: A game-theoretic analysis. In 2007 IEEE SMC information assurance and security workshop . IEEE , 107--113. Nandan Garg and Daniel Grosu. 2007. Deception in honeynets: A game-theoretic analysis. In 2007 IEEE SMC information assurance and security workshop. IEEE, 107--113."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3140549.3140555"},{"key":"e_1_3_2_1_12_1","volume-title":"Herber","author":"Heckman Kristin E.","year":"2013","unstructured":"Kristin E. Heckman , Michael J. Walsh , Frank J. Stech , Todd A. O'Boyle , Stephen R. DiCato , and Audra F . Herber . 2013 . Active Cyber Defense with Denial and Deception: A Cyber-Wargame Experiment. Computers & Security , Vol. 37 (Sept. 2013), 72--77. https:\/\/doi.org\/10.1016\/j. cose.2013.03.015 10.1016\/j Kristin E. Heckman, Michael J. Walsh, Frank J. Stech, Todd A. O'Boyle, Stephen R. DiCato, and Audra F. Herber. 2013. Active Cyber Defense with Denial and Deception: A Cyber-Wargame Experiment. Computers & Security , Vol. 37 (Sept. 2013), 72--77. https:\/\/doi.org\/10.1016\/j. cose.2013.03.015"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342467"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516671"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2014.6918979"},{"key":"e_1_3_2_1_16_1","volume-title":"OpenHIP Random Host Hopping in Network Layer. In International Conference on Education, Management and Information Technology (ICEMIT","author":"Kechao Li","year":"2019","unstructured":"Li Kechao and Xiong Xinli . 2019 . OpenHIP Random Host Hopping in Network Layer. In International Conference on Education, Management and Information Technology (ICEMIT 2019). Li Kechao and Xiong Xinli. 2019. OpenHIP Random Host Hopping in Network Layer. In International Conference on Education, Management and Information Technology (ICEMIT 2019)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7510833"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.314"},{"key":"e_1_3_2_1_19_1","volume-title":"Branislav Bovs ansk\u1ef3, and Michal Pve chouvc ek","author":"P'ibil Radek","year":"2012","unstructured":"Radek P'ibil , Viliam Lis\u1ef3 , Christopher Kiekintveld , Branislav Bovs ansk\u1ef3, and Michal Pve chouvc ek . 2012 . Game theoretic model of strategic honeypot selection in computer networks. In International conference on decision and game theory for security. Springer , 201--220. Radek P'ibil, Viliam Lis\u1ef3, Christopher Kiekintveld, Branislav Bovs ansk\u1ef3, and Michal Pve chouvc ek. 2012. Game theoretic model of strategic honeypot selection in computer networks. In International conference on decision and game theory for security. Springer, 201--220."},{"key":"e_1_3_2_1_20_1","unstructured":"Niels Provos. 2002. Honeyd is a small daemon that creates virtual hosts on a network. http:\/\/www.honeyd.org\/. Accessed: 2022-07--12.  Niels Provos. 2002. Honeyd is a small daemon that creates virtual hosts on a network. http:\/\/www.honeyd.org\/. Accessed: 2022-07--12."},{"key":"e_1_3_2_1_21_1","unstructured":"Lukas Rist. 2011. Web Application Honeypot. https:\/\/github.com\/mushorg\/glastopf. Accessed: 2022-07--12.  Lukas Rist. 2011. Web Application Honeypot. https:\/\/github.com\/mushorg\/glastopf. Accessed: 2022-07--12."},{"key":"e_1_3_2_1_22_1","unstructured":"Lukas Rist. 2018. Conpot is a low interactive server side Industrial Control Systems honeypot. http:\/\/conpot.org\/. Accessed: 2022-07--12.  Lukas Rist. 2018. Conpot is a low interactive server side Industrial Control Systems honeypot. http:\/\/conpot.org\/. Accessed: 2022-07--12."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.2.2.25-36"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2982955"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2854152"},{"key":"e_1_3_2_1_26_1","volume-title":"Random Host and Service Multiplexing for Moving Target Defense in Software-Defined Networks. In ICC 2019 - 2019 IEEE International Conference on Communications (ICC ). 1--6. https:\/\/doi.org\/10","author":"Sharma Dilli P.","year":"2019","unstructured":"Dilli P. Sharma , Jin-Hee Cho , Terrence J. Moore , Frederica F. Nelson , Hyuk Lim , and Dong Seong Kim . 2019 . Random Host and Service Multiplexing for Moving Target Defense in Software-Defined Networks. In ICC 2019 - 2019 IEEE International Conference on Communications (ICC ). 1--6. https:\/\/doi.org\/10 .1109\/ICC.2019.8761496 10.1109\/ICC.2019.8761496 Dilli P. Sharma, Jin-Hee Cho, Terrence J. Moore, Frederica F. Nelson, Hyuk Lim, and Dong Seong Kim. 2019. Random Host and Service Multiplexing for Moving Target Defense in Software-Defined Networks. In ICC 2019 - 2019 IEEE International Conference on Communications (ICC ). 1--6. https:\/\/doi.org\/10.1109\/ICC.2019.8761496"},{"key":"e_1_3_2_1_27_1","volume-title":"Seunghyun Yoon, Hyuk Lim, Jin-Hee Cho, and Terrence J. Moore.","author":"Sharma Dilli Prasad","year":"2018","unstructured":"Dilli Prasad Sharma , Dong Seong Kim , Seunghyun Yoon, Hyuk Lim, Jin-Hee Cho, and Terrence J. Moore. 2018 . FRVM : Flexible Random Virtual IP Multiplexing in Software-Defined Networks. In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications \/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom \/BigDataSE ) . 579--587. https:\/\/doi.org\/10.1109\/TrustCom\/BigDataSE.2018.00088 10.1109\/TrustCom Dilli Prasad Sharma, Dong Seong Kim, Seunghyun Yoon, Hyuk Lim, Jin-Hee Cho, and Terrence J. Moore. 2018. FRVM : Flexible Random Virtual IP Multiplexing in Software-Defined Networks. In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications \/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom \/BigDataSE ). 579--587. https:\/\/doi.org\/10.1109\/TrustCom\/BigDataSE.2018.00088"},{"key":"e_1_3_2_1_28_1","unstructured":"Upi Tamminen. 2009. Kippo is a medium interaction SSH honeypot designed to log brute force attacks. https:\/\/github.com\/desaster\/kippo. Accessed: 2022-07--12.  Upi Tamminen. 2009. Kippo is a medium interaction SSH honeypot designed to log brute force attacks. https:\/\/github.com\/desaster\/kippo. Accessed: 2022-07--12."},{"key":"e_1_3_2_1_29_1","volume-title":"Incorporating deception into cyberbattlesim for autonomous defense. arXiv preprint arXiv:2108.13980","author":"Walter Erich","year":"2021","unstructured":"Erich Walter , Kimberly Ferguson-Walter , and Ahmad Ridley . 2021. Incorporating deception into cyberbattlesim for autonomous defense. arXiv preprint arXiv:2108.13980 ( 2021 ). Erich Walter, Kimberly Ferguson-Walter, and Ahmad Ridley. 2021. Incorporating deception into cyberbattlesim for autonomous defense. arXiv preprint arXiv:2108.13980 (2021)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2004.1437806"}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","location":"Los Angeles CA USA","acronym":"CCS '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 9th ACM Workshop on Moving Target Defense"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3560828.3564006","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3560828.3564006","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:34Z","timestamp":1750186834000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3560828.3564006"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":32,"alternative-id":["10.1145\/3560828.3564006","10.1145\/3560828"],"URL":"https:\/\/doi.org\/10.1145\/3560828.3564006","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}